IDENTITY AND ACCESS MANAGEMENT ARCHITECT Flashcards
(248 cards)
Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration supports the company’s single sign-on process to Salesforce,
Which Salesforce OAuth authorization flow should be used?
A. OAuth 2.0 SAML Bearer Assertion Flow
B. A SAML Assertion Row
C. OAuth 2.0 User-Agent Flow
D. OAuth 2.0 JWT Bearer Flow
Answer: B
An identity architect’s client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.
What should the identity architect recommend to make sure that there is additional trust between the SP and
the IdP?
A . Ensure that there is an HTTPS connection between IDP and SP.
B . Ensure that on the SSO settings page, the ‘Request Signing Certificate’ field has a self-signed certificate.
C . Ensure that the Issuer and Assertion Consumer service (ACS) URL is property configured between SP and IDP.
D . Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.
Answer: D
A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification.
Which feature should an identity architect recommend to meet the requirements?
A . Integrate with social websites (Facebook, Linkedin. Twitter)
B . Use an external Identity Provider
C . Create a custom Lightning Web Component
D . Use Login Discovery
Answer: D
Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer selfservice. Guests of the portal be able to self-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have bee purchased for the project. After registered guests complete an onboarding process, a flow will create the appropriate account and contact records for the user.
Which three steps should an identity architect follow to implement the outlined requirements?
Choose 3 answers
A . Enable ‘Allow customers and partners to self-register’.
B . Select the ‘Configurable Self-Reg Page’ option under Login & Registration.
C . Set jp an external login page and call Salesforce APIs for user creation.
D . Customize the self-registration Apex handler to temporarily associate the user to a shared single contact
record.
E . Customize me self-registration Apex handler to create only the user record.
Answer: A, B, E
Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs U perform a forensic analysis and identify signals that could Indicate a breach has occurred.
What should NTO’s first step be in gathering signals that could indicate account compromise?
A . Review the User record and evaluate the login and transaction history.
B . Download the Setup Audit Trail and review all recent activities performed by the user.
C . Download the Identity Provider Event Log and evaluate the details of activities performed by the user.
D . Download the Login History and evaluate the details of logins performed by the user.
Answer: D
When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?
A . The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion Markup Language
(SAML) flows as a URL parameter.
B . Provide a brand picker that the end user can use to select its sub-brand when they arrive on salesforce.
C . Add a custom parameter to the service provider’s OAuth/SAML call and implement logic on its login page
to apply branding based on the parameters value.
D . The Audience ID, which can be set in a shared cookie.
Answer: A
Northern Trail Outfitters (NTO) has an off-boarding process where a terminated employee is first disabled in the Lightweight Directory Act Protocol (LDAP) directory, then requests are sent to the various application support teams to finish user deactivations. A terminated employee recently was able to login to NTO’s Salesforce instance 24 hours after termination, even though the user was disabled in the corporate LDAP directory.
What should an identity architect recommend to prevent this from happening in the future?
A . Create a Just-in-Time provisioning registration handler to ensure users are deactivated in Salesforce as they
are disabled in LDAP.
B . Configure an authentication provider to delegate authentication to the LDAP directory.
C . use a login flow to make a callout to the LDAP directory before authenticating the user to Salesforce.
D . Setup an identity provider (IdP) to authenticate users using LDAP, set up single sign-on to Salesforce and disable Login Form authentication.
Answer: B
A university is planning to set up an identity solution for its alumni. A third-party identity provider will be used for single sign-on Salesforce will be the system of records. Users are getting error messages when logging in.
Which Salesforce feature should be used to debug the issue?
A . Apex Exception Email
B . View Setup Audit Trail
C . Debug Logs
D . Login History
Answer: D
An insurance company has a connected app in its Salesforce environment that is used to integrate with a Google Workspace (formerly knot as G Suite). An identity and access management (IAM) architect has been asked to implement automation to enable users,
freeze/suspend users, disable users, and reactivate existing users in Google Workspace upon similar actions in
Salesforce.
Which solution is recommended to meet this requirement?
A . Configure user Provisioning for Connected Apps.
B . Update the Security Assertion Markup Language Just-in-Time (SAML JIt; handler in Salesforce for user
provisioning and de-provisioning.
C . Build a custom REST endpoint in Salesforce that Google Workspace can poll against.
D . Build an Apex trigger on the useriogin object to make asynchronous callouts to Google APIs.
Answer: A
Universal Containers is creating a web application that will be secured by Salesforce Identity using the OAuth 2.0 Web Server Flow uses the OAuth 2.0 authorization code grant type).
Which three OAuth concepts apply to this flow?
Choose 3 answers
A . Verification URL
B . Client Secret
C . Access Token
D . Scopes
Answer: B, C, D
An administrator created a connected app for a custom wet) application in Salesforce which needs to be visible as a tile in App Launcher The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.
Which two reasons are the source of the issue?
Choose 2 answers
A . StartURL for the connected app is not set in Connected App settings.
B . OAuth scope does not include ‘openid*.
C . Session Policy is set as ‘High Assurance Session required’ for this connected app.
D . The connected app is not set in the App menu as ‘Visible in App Launcher’.
Answer: A, C
Northern Trail Outfitters (NTO) recently purchased Salesforce Identity Connect to streamline user provisioning across Microsoft Active Directory (AD) and Salesforce Sales Cloud. NTO has asked an identity architect to identify which salesforce security configurations can map to AD permissions.
Which three Salesforce permissions are available to map to AD permissions?
Choose 3 answers
A . Public Groups
B . Field-Level Security
C . Roles
D . Sharing Rules
E . Profiles and Permission Sets
Answer: A, C, E
An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to authenticate to Salesforce and then make API calls against the REST API.
One of the requirements is that the solution needs to ensure the third party service providers connected app
in Salesforce mini need for end user interaction and maximizes security.
Which OAuth flow should be used to fulfill the requirement?
A . JWT Bearer Flow
B . Web Server Flow
C . User Agent Flow
D . Username-Password Flow
Answer: A
Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Okta to authorize a Forecasting web application to access Salesforce records on their behalf.
Which two roles are being performed by Salesforce?
Choose 2 answers
A . SAML Identity Provider
B . OAuth Client
C . OAuth Resource Server
D . SAML Service Provider
Answer: B, D
A multinational industrial products manufacturer is planning to implement Salesforce CRM to manage their business. They have the following requirements:
- They plan to implement Partner communities to provide access to their partner network .
- They have operations in multiple countries and are planning to implement multiple Salesforce orgs.
- Some of their partners do business in multiple countries and will need information from multiple Salesforce
communities. - They would like to provide a single login for their partners.
How should an Identity Architect solution this requirement with limited custom development?
A . Create a partner login for the country of their operation and use SAML federation to provide access to
other orgs.
B . Consolidate Partner related information in a single org and provide access through Salesforce community.
C . Allow partners to choose the Salesforce org they need information from and use login flows to authenticate
access.
D . Register partners in one org and access information from other orgs using APIs.
Answer: A
Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.
Which two options should an identity architect recommend to meet the requirement?
Choose 2 answers
A . Active Directory Password Sync Plugin
B . Configure Cloud Provider Load Balancer
C . Salesforce Trigger & Field on Contact Object
D . Salesforce Identity Connect
Answer: A, D
Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate and place orders, view the status of orders, etc. UC allows guest checkout.
Mow can a guest register using data previously collected during order placement?
A . Enable Security Assertion Markup Language Sign-On and use a login flow to collect only order details to
retrieve customer data.
B . Enable Facebook as an authentication provider and use a registration handler to collect only order details
to retrieve customer data.
C . Use a Connected App Handler Apex Plugin class to collect only order details to retrieve customer data.
D . Enable self-registration and customize a self-registration page to collect only order details to retrieve
customer data.
Answer: D
Northern Trail Outfitters (NTO) employees use a custom on-premise helpdesk application to request, approve, notify, and track access granted to various on-premises and cloud applications, including Salesforce. Salesforce is currently used to authenticate users.
How should NTO provision Salesforce users as soon as they are approved in the helpdesk application with the
approved profiles and permission sets?
A . Build an integration that performs a remote call-in to the Salesforce SOAP or REST API.
B . Use a login flow to query the helpdesk to validate user status.
C . Have the helpdesk initiate an IdP-initiated Just-m-Time provisioning Security Assertion Markup Language
flow.
D . Use Salesforce Connect to integrate with the helpdesk application.
Answer: B
Universal Containers allows employees to use a mobile device to access Salesforce for daily operations using a hybrid mobile app. This app uses Mobile software development kits (SDK), leverages refresh token to regenerate access token when required and is distributed as a private app. The chief security officer is rolling out an org wide compliance policy to enforce re-venfication of devices if an
employee has not logged in from that device in the last week.
Which connected app setting should be leveraged to comply with this policy change?
A . Scope - Deny refresh_token scope for this connected app.
B . Refresh Token Policy - Expire the refresh token if it has not been used for 7 days.
C . Session Policy - Set timeout value of the connected app to 7 days.
D . Permitted User - Ask admins to maintain a list of users who are permitted based on last login date.
Answer: B
A company wants to provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other Non Salesforce internal applications once users authenticate with
Salesforce. The apps self-authorize, and users are permitted to use the apps once they have logged into
Salesforce.
How should an identity architect meet the above requirements with the privately distributed mobile app?
A . Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other Non Salesforce internal apps.
B . Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.
C . Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other nonSalesforce internal apps.
D . Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps
Answer: B
A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.
Which two features should be utilized to provide users with login and identity services for the third-party application?
Choose 2 answers
A . Use the App Launcher with single sign-on (SSO).
B . External a Data source with Named Principal identity type.
C . Use a connected app.
D . Use Delegated Authentication.
Answer: A, C
Northern Trail Outfitters manages application functional permissions centrally as Active Directory groups. The CRM_Superllser and CRM_Reportmg_SuperUser groups should respectively give the user the SuperUser and Reportmg_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion
Markup Language (SAML) identity provider.
Mow should an identity architect ensure the Active Directory groups are reflected correctly when a user accesses Salesforce?
A . Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.
B . Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.
C . Use a login flow to query custom SAML attributes and set permission sets.
D . Use a login flow to query standard SAML attributes and set permission sets.
Answer: B
A financial enterprise is planning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.
Which authentication mechanism should an identity architect recommend to meet the requirements?
A . OAuth Web-Server Flow
B . Identity Connect
C . Delegated Authentication
D . Just-in-Time Provisioning
Answer: C
A real estate company wants to provide its customers a digital space to design their interior decoration options. To simplify the registration to gain access to the community site (built in Experience Cloud), the CTO has requested that the IT/Development team provide the option for customers to use their existing socialmedia credentials to register and access.
The IT lead has approached the Salesforce Identity and Access Management (IAM) architect for technical direction on implementing the social sign-on (for Facebook, Twitter, and a new provider that supports standard OpenID Connect (OIDC)).
Which two recommendations should the Salesforce IAM architect make to the IT Lead?
Choose 2 answers
A . Use declarative registration handler process builder/flow to create, update users and contacts.
B . Authentication provider configuration is required each social sign-on providers; and enable Authentication
providers in
community.
C . For supporting OIDC it is necessary to enable Security Assertion Markup Language (SAML) with Just-in-Time
provisioning (JIT) and OAuth 2.0.
D . Apex coding skills are needed for registration handler to create and update users.
Answer: B, D